Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%
Get alerts for future matching vulnerabilitiesLog in to subscribe
I. Basic Information for CVE-2024-53995
Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
GHSL-2024-288: SickChill open redirect in login
Source: NVD (National Vulnerability Database)
Vulnerability Description
SickChill is an automatic video library manager for TV shows. A user-controlled `login` endpoint's `next_` parameter takes arbitrary content. Prior to commit c7128a8946c3701df95c285810eb75b2de18bf82, an authenticated attacker may use this to redirect the user to arbitrary destinations, leading to open redirect. Commit c7128a8946c3701df95c285810eb75b2de18bf82 changes the login page to redirect to `settings.DEFAULT_PAGE` instead of to the `next` parameter.
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
指向未可信站点的URL重定向(开放重定向)
Source: NVD (National Vulnerability Database)
Vulnerability Title
SickChill 输入验证错误漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
SickChill是SickChill开源的一个应用程序。 SickChill存在输入验证错误漏洞,该漏洞源于用户控制的登录端点中next_参数可接收任意内容,经过身份验证的攻击者可利用此漏洞将用户重定向到任意目标,从而导致开放重定向。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)
Affected Products
VendorProductAffected VersionsCPESubscribe
SickChillsickchill <= 2024.3.1 -
II. Public POCs for CVE-2024-53995
#POC DescriptionSource LinkShenlong Link
1SickChill's login endpoint's 'next_' parameter accepts arbitrary content, allowing authenticated attackers to perform open redirects, but this was fixed in commit c7128a8946c3701df95c285810eb75b2de18bf82 by redirecting to a default page. https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2024/CVE-2024-53995.yamlPOC Details
AI-Generated POCPremium

No public POC found.

Login to generate AI POC
III. Intelligence Information for CVE-2024-53995
Please Login to view more intelligence information
IV. Related Vulnerabilities
V. Comments for CVE-2024-53995

No comments yet


Leave a comment